public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Robin H. Johnson (robbat2)" <robbat2@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] gentoo commit in users/robbat2/tree-signing-gleps: 00-proposal-overview
Date: Thu, 09 Oct 2008 21:33:53 +0000	[thread overview]
Message-ID: <E1Ko38r-0008JI-O1@stork.gentoo.org> (raw)

robbat2     08/10/09 21:33:53

  Modified:             00-proposal-overview
  Log:
  Fix sentance structure, include reference to Cappos et al work and the existing signed HTTP snapshots.

Revision  Changes    Path
1.11                 users/robbat2/tree-signing-gleps/00-proposal-overview

file : http://sources.gentoo.org/viewcvs.py/gentoo/users/robbat2/tree-signing-gleps/00-proposal-overview?rev=1.11&view=markup
plain: http://sources.gentoo.org/viewcvs.py/gentoo/users/robbat2/tree-signing-gleps/00-proposal-overview?rev=1.11&content-type=text/plain
diff : http://sources.gentoo.org/viewcvs.py/gentoo/users/robbat2/tree-signing-gleps/00-proposal-overview?r1=1.10&r2=1.11

Index: 00-proposal-overview
===================================================================
RCS file: /var/cvsroot/gentoo/users/robbat2/tree-signing-gleps/00-proposal-overview,v
retrieving revision 1.10
retrieving revision 1.11
diff -p -w -b -B -u -u -r1.10 -r1.11
--- 00-proposal-overview	13 Jul 2008 06:45:03 -0000	1.10
+++ 00-proposal-overview	9 Oct 2008 21:33:53 -0000	1.11
@@ -1,11 +1,7 @@
-TODO: 
-- Add mention of signed HTTP snapshots from 01
-- Add replay attacks from Cappos et al.
-
 GLEP: xx
 Title: Security of distribution of Gentoo software - Overview
-Version: $Revision: 1.10 $
-Last-Modified: $Date: 2008/07/13 06:45:03 $
+Version: $Revision: 1.11 $
+Last-Modified: $Date: 2008/10/09 21:33:53 $
 Author: Robin Hugh Johnson <robbat2@gentoo.org>
 Status: Draft
 Type: Informational
@@ -96,8 +92,8 @@ are not maintained by Gentoo Infrastruct
 Attacks may be conducted against any of these entities. Obviously
 direct attacks against Upstream and Users are outside of the scope of
 this series of GLEPs as they are not in any way controlled or
-controllable by Gentoo - however attacks using Gentoo as a conduit (such
-as adding a payload at a mirror) must be considered.
+controllable by Gentoo - however attacks using Gentoo as a conduit
+(including malicous mirrors) must be considered.
 
 Processes
 ---------
@@ -141,6 +137,11 @@ by syncing from one of the community-pro
 protection against this class of attacks is very easy to implement with
 little added cost. 
 
+At the level of mirrors, addition of malicious content is not the only
+attack. As discussed by Cappos et al [C08a,C08b], an attacker may use
+exclusion and replay attacks, possibly only on a specific subset of
+user to extend the window of opportunity on another exploit.
+
 Security for Processes
 ------------------------
 Protection for process #1 can never be complete (without major
@@ -165,7 +166,9 @@ objective is actually much closer than i
 work has been completed for other things!. This is further discussed in
 [GLEPxx+1]. As this process has the most to gain in security, and the
 most immediate impact, it should be implemented before or at the same
-time as any changes to process #1.
+time as any changes to process #1. Security at this layer is already
+available in the signed daily snapshots, but we can extend it to cover
+the rsync mirrors as well.
 
 Requirements pertaining to and management of keys (OpenPGP or otherwise)
 is an issue that affects both processes, and is broken out into a
@@ -291,6 +294,17 @@ spelling, grammar, research (esp. tracki
 vulnerability that has been mentioned in past discussions, and
 integrating them in this overview).
 
+==========
+References
+==========
+
+[C08a] Cappos, J et al. (2008). "Package Management Security".
+    University of Arizona Technical Report TR08-02. Available online
+    from: ftp://ftp.cs.arizona.edu/reports/2008/TR08-02.pdf
+[C08b] Cappos, J et al. (2008). "Attacks on Package Managers"
+    Available online at:
+    http://www.cs.arizona.edu/people/justin/packagemanagersecurity/
+
 Copyright
 =========
 Copyright (c) 2006 by Robin Hugh Johnson. This material may be






             reply	other threads:[~2008-10-09 21:33 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-10-09 21:33 Robin H. Johnson (robbat2) [this message]
  -- strict thread matches above, loose matches on Subject: below --
2008-10-22  0:33 [gentoo-commits] gentoo commit in users/robbat2/tree-signing-gleps: 00-proposal-overview Robin H. Johnson (robbat2)
2008-10-09 22:04 Robin H. Johnson (robbat2)
2008-07-13  6:45 Robin H. Johnson (robbat2)
2008-07-01  7:00 Robin H. Johnson (robbat2)
2007-12-11  9:29 Robin H. Johnson (robbat2)
2007-11-28  0:25 Robin H. Johnson (robbat2)

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=E1Ko38r-0008JI-O1@stork.gentoo.org \
    --to=robbat2@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox